Using Encryption for Authentication in Large Networks of Computers.
Roger M. NeedhamMichael D. SchroederPublished in: Commun. ACM (1978)
Keyphrases
- encryption decryption
- identity authentication
- data encryption
- public key cryptography
- integrity verification
- image authentication
- social networks
- network structure
- virtual private network
- security analysis
- elliptic curve cryptography
- computer systems
- high security
- public key
- authentication scheme
- local area network
- user authentication
- ciphertext
- digital watermarking
- data security